- April 17, 2013Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German ConsumersWe are pleased to present the results from Moving Beyond Passwords: Consumer Attitudes on Online Authentication A Study of US, UK and German Consumers. In th...Read More
- March 5, 2013Security of Cloud Computing Users 2013 StudyToday we are releasing a very interesting follow up study on how organizations are improving--or not--their cloud security practices. The Security of Cloud Computing Users ...Read More
- February 28, 2013Risk of Insider Fraud: Second Annual StudyToday we released a new study entitled the Risk of Insider Fraud: Second Annual Study . The research reveals that the number of employee-related incidents of fraud continue...Read More
- February 26, 2013The Post Breach BoomData breaches have become a fact of life for organizations of all sizes, in every industry and in many parts of the globe. While many organizations anticipate that at some ...Read More
- February 25, 2013Big Data Analytics in Cyber DefenseThe purpose of the Big Data Analytics in Cyber Defense study sponsored by Teradata and conducted by Ponemon Institute is to learn about organizations’ cyber...Read More
- February 21, 2013Understanding the Methodology and Staggering Costs in the Annual Cost of Failed Trust ReportSome staggering numbers Every Global 2000 enterprise faces a total exposure of almost U.S. $400 million over 24 months due to new and evolving attacks on failed cryptograph...Read More
- February 13, 2013The Post Breach BoomSponsored by Solera Networks, The Post Breach Boom study was conducted by Ponemon Institute to understand the differences between non-malicious and malicious data breaches ...Read More
- January 28, 20132012 Most Trusted Companies for PrivacyDo we still care about privacy? According to our annual study on privacy trust, more and more of us do care. Our biggest privacy concerns are the fear of identity theft and...Read More
- January 28, 20132012 Most Trusted Companies for PrivacyWe are pleased to present the results from the 2012 Most Trusted Companies for Privacy study. This is an objective study that asks consumers to name and rate organiza...Read More
- December 6, 2012Third Annual Patient Privacy & Data Security Study ReleasedCould BYOD increase the risks of a healthcare data breach and medical identity theft? The third annual study on Patient Privacy and Data Security reveals the explosion of m...Read More
- December 6, 2012Third Annual Patient Privacy & Data Security StudyHealthcare organizations seem to face an uphill battle in their efforts to stop and reduce the loss or theft of protected health information (PHI) or patient information. A...Read More
- December 5, 20122013 State of the EndpointSponsored by Lumension, the 2013 State of the Endpoint is our third annual study that tracks endpoint risk in organizations, the resources to address the risk and the techn...Read More
- December 5, 20122013 State of the EndpointWe are pleased to present the results of the 2013 State of the Endpoint study sponsored by Lumension® and conducted by Ponemon Institute. Since 2010, we have ...Read More
- October 10, 2012Visual Privacy Productivity StudyPonemon Institute is please to present the results from the Visual Privacy Productivity Study sponsored by 3M. An experimental study was conducted on how the use of a priva...Read More
- October 8, 20122012 Cost of Cyber Crime StudyThe purpose of this benchmark research is to quantify the economic impact of cyber attacks and observe cost trends over time. We believe a better understanding of the cost ...Read More
- October 2, 20122012 Web Session Intelligence & Security Report: Business Logic Abuse Edition sponsored by Silver Tail SystemsWe have just released the first study we conducted on business logic abuse or as it is sometimes called, precision hacking. The 2012 Web Session Intelligence & Security...Read More
- August 13, 20122012 Business Banking Trust Trends StudyGuardian Analytics and Ponemon Institute are pleased to present the results of the 2012 Business Banking Trust Trends Study . This is the third annual study conducted ...Read More
- July 10, 20122012 Confidential Documents at Risk StudyPonemon Institute is pleased to present the results of the 2012 Confidential Documents at Risk Study. Sponsored by WatchDox, this is the first research study on the state o...Read More
- July 10, 2012Encryption in the Cloud Who is responsible for data protection in the cloud?Ponemon Institute is pleased to present the findings of Encryption in the Cloud. This research is a supplementary report that is part of a larger study entitled the 2011 Gl...Read More
- July 9, 20122012 Payment Security Practices Survey: United StatesA secure payment process is essential to maintaining customer confidence and trust when making online purchases and sharing financial information. Managing payment security...Read More
- June 12, 2012Third Annual Survey on Medical Identity Theft Ponemon InstituteWe are pleased to present the findings of the Third Annual Survey on Medical Identity Theft conducted by Ponemon Institute and sponsored by Experian’s ProtectMyI...Read More
- May 9, 2012The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and BrazilConducted by Ponemon Institute and sponsored by Check Point Software Technologies, we are pleased to present the findings of The Impact of Cybercrime on Business. ...Read More
- March 12, 20122012 Application Security Gap Study: A Survey of IT Security & DevelopersPonemon Institute is pleased to present the results of 2012 Application Security Gap Study: A Survey of IT Security & Developers sponsored by Security Innovation. The r...Read More
- March 5, 20122011 Cost of Data Breach: ItalyPonemon Institute conducted its first Cost of a Data Breach study in the United States seven years ago. Since then, we have expanded the study to include France, Germany, t...Read More
- March 5, 20122011 Cost of Data Breach: United KingdomSymantec Corporation and Ponemon Institute are pleased to present 2011 Cost of Data Breach Study: United Kingdom, our fifth annual benchmark study concerning the cost of da...Read More
Security
Categories
Tags
- Access Governance (2)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (1)
- Application Security (3)
- Authentication Process (1)
- Autonomous Automobile (1)
- Autonomous Car (1)
- Autonomous Vehicle Security (1)
- Best Practices (10)
- Big Data (1)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- BYOID (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (2)
- Communication Inefficiency (1)
- Compliance (7)
- Confidential Data (2)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (2)
- Cryptographic (1)
- Cryptographic Key (1)
- Cryptography (3)
- Cyber Attack (2)
- Cyber Attacks (17)
- Cyber Crime (9)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (2)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (2)
- Cyber Threat (2)
- Data Breach (29)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (3)
- Data Loss (1)
- Data Protection (12)
- Data Risk (1)
- Data Security (14)
- DDoS (2)
- Denial Of Service (1)
- Digital Certificate Management (2)
- DLP (2)
- Document-centric Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encrypting Ransomware (1)
- Encryption (5)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (5)
- Explanation Of Benefits (1)
- File Sharing (1)
- Firewall (1)
- Fraud (3)
- Geo-location (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Hidden Threats (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Incident Response (1)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (1)
- Intellectual Property (1)
- Internet Of Things (2)
- IT Architecture (1)
- IT Security (12)
- IT Security Department (2)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (9)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (1)
- Online Banking (1)
- Online Behavioral Advertising (1)
- Online Health Services (1)
- Open Enterprise (1)
- Operational Technology (OT) (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- PKI (2)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Product security (1)
- Productivity (1)
- Providers (1)
- Ransomware (2)
- Regulated Data (1)
- Retail Banking (2)
- Retail Breaches (1)
- Risk (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk Management (2)
- SaaS (1)
- Security (7)
- Security Innovation (1)
- Security Intelligence (4)
- Security Metrics (1)
- Security operations center (1)
- Security Posture (2)
- Security Professional (1)
- Security Risk (5)
- Security Strategy (1)
- Security Technologies (6)
- Security Threat (2)
- Senior Executives (2)
- SIEM (2)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SQL Injection (2)
- SSO (1)
- Staff (1)
- Supply chain security (1)
- System Glitch (1)
- Technology (1)
- Third Party Risk (4)
- Third-party Ecosystem (2)
- Threat Intelligence (7)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Understaffed (1)
- Vulnerable Code (1)
- Web-based Attacks (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202220212020201920182017201620152014- January (3)
- February (4)
- March (4)
- April (4)
- May (2)
- June (4)
- July (3)
- August (1)
- September (2)
- October (3)
- November (1)